Online Deception Detection Using BDI Agents Richard Alan Merritts Nova Southeastern University, [email protected]

Total Page:16

File Type:pdf, Size:1020Kb

Online Deception Detection Using BDI Agents Richard Alan Merritts Nova Southeastern University, Ramerritts@Yahoo.Com Nova Southeastern University NSUWorks CEC Theses and Dissertations College of Engineering and Computing 2013 Online Deception Detection Using BDI Agents Richard Alan Merritts Nova Southeastern University, [email protected] This document is a product of extensive research conducted at the Nova Southeastern University College of Engineering and Computing. For more information on research and degree programs at the NSU College of Engineering and Computing, please click here. Follow this and additional works at: https://nsuworks.nova.edu/gscis_etd Part of the Computer Sciences Commons Share Feedback About This Item NSUWorks Citation Richard Alan Merritts. 2013. Online Deception Detection Using BDI Agents. Doctoral dissertation. Nova Southeastern University. Retrieved from NSUWorks, Graduate School of Computer and Information Sciences. (244) https://nsuworks.nova.edu/gscis_etd/244. This Dissertation is brought to you by the College of Engineering and Computing at NSUWorks. It has been accepted for inclusion in CEC Theses and Dissertations by an authorized administrator of NSUWorks. For more information, please contact [email protected]. Online Deception Detection Using BDI Agents by Richard A. Merritts A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Systems Graduate School of Computer and Information Sciences Nova Southeastern University 2013 ii An Abstract of a Dissertation Submitted to Nova Southeastern University in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Online Deception Detection Using BDI Agents by Richard A. Merritts September 2013 This research has two facets within separate research areas. The research area of Belief, Desire and Intention (BDI) agent capability development was extended. Deception detection research has been advanced with the development of automation using BDI agents. BDI agents performed tasks automatically and autonomously. This study used these characteristics to automate deception detection with limited intervention of human users. This was a useful research area resulting in a capability general enough to have practical application by private individuals, investigators, organizations and others. The need for this research is grounded in the fact that humans are not very effective at detecting deception whether in written or spoken form. This research extends the deception detection capability research in that typical deception detection tools are labor intensive and require extraction of the text in question following ingestion into a deception detection tool. A neural network capability module was incorporated to lend the resulting prototype Machine Learning attributes. The prototype developed as a result of this research was able to classify online data as either “deceptive” or “not deceptive” with 85% accuracy. The false discovery rate for “deceptive” online data entries was 20% while the false discovery rate for “not deceptive” was 10%. The system showed stability during test runs. No computer crashes or other anomalous system behavior were observed during the testing phase. The prototype successfully interacted with an online data communications server database and processed data using Neural Network input vector generation algorithms within seconds. iii Acknowledgements I would like to express my gratitude to Dr. James Cannady for providing excellent guidance as my Dissertation Chair. I would also like to extend my gratitude to Dr. Sumitra Mukherjee and Dr. George Thurmond, II for their support and encouragement as members of the Dissertation Committee. All worked as a team to influence my activities and guide the research process in the right direction from start to finish. I would also like to thank my family for their support and especially Karen. The dissertation process can be very stressful and strong family encouragement and enthusiasm to complete the program are key ingredients for success. Special thanks to Aynsley and Richard, Jr. for making me laugh. iv Table of Contents Abstract iii Acknowledgements iv List of Tables vii List of Figures viii Chapters 1. Introduction 6 Background 6 Problem Statement 7 Dissertation Goal 7 Relevance and Significance 8 Barriers and Issues 8 Limitations 9 Delimitations 10 Definitions of Terms 10 Summary 11 2. Review of the Literature 12 3. Methodology 43 Overview of the Research Methodology 43 Specifics of the Research 46 Format for Results 68 Resource Requirements 69 Summary 70 4. Results 71 Data Analysis 71 Findings 79 Summary of Results 81 v 5. Conclusions, Implications, Recommendations and Summary 84 Conclusions 84 Strengths 86 Weaknesses 87 Limitations 88 Implications 88 Recommendations 91 Summary 93 Appendices A. Weblog Data Entry Instructions 102 B. Performance Test Results 104 C. Neural Network File Division Procedures 106 D. Neural Network Validation Results 108 E. Neural Network Test Plan, Test Procedures and Test Results 110 F. ARFF Training File Contents 118 G. ARFF Testing File Contents 122 References 124 vi List of Tables Tables 1. ART Definitions 37 2. Classification Validation Results 75 3. Classification Test Results 76 4. Test Results “weblogentry” Database Table Backup 104 5. Test Results “vectors.csv” File Creation 104 6. Test Results backup “vectors.csv” File Creation 105 7. Test Results “vectors.csv” File Deletion 105 vii List of Figures Figures 1. Prototype Architecture and Working Scenario 54 2. Depiction of Prototype Development and Test Process 66 3. Formulae for Deception Detection Accuracy and False Discovery 69 4. WEKA GUI 77 5. “Not Deceptive” False Discovery Rate Formula 78 viii 6 Chapter 1 Introduction Background The Internet is often used by people involved in criminal, terror, fraud, harassment and other malicious conduct (Boongoen, & Shen, 2009). Deception in online data communications is commonly used by such persons as a precursor to the commission of these acts. The word deception can be described as information that falsely represents a fact and is intended to mislead the person to whom it is presented. Because online data has the persistence quality, deceptive information contained therein has the ability to deceive many persons over its lifetime. This quality remains until the deception is discovered and eliminated. If unchecked, online data communications deception persistence allows repeated deception over a broad scope of people and entities that encounter it. Verbal deception is only effective as long as the source of the untruth continues to tell the lies. If others continue the deception it becomes rumor and loses its effect. Deceptive data communications can influence individual’s intent on relying on Internet based information for decision making to make poor decisions based on faulty information or become victims of Internet crimes (Jensen, Burgoon, & Nunamaker, 2010). Research conducted in an effort to protect against deception in online data communications is gaining in importance as people and organizations fall victim to Internet based malicious activities more and more. The ability to detect deception rapidly may serve to slow or disallow the dissemination of deceptive information. Rapidly refers 7 to the amount of time that an individual needs to determine whether a deception has occurred using automated tools. The U.S. Government has a keen interest in identifying deception in online data communications as part of its Information Operations (IO) initiative. IO is defined by the U.S. Government below: Information operations (IO) are described as the integrated employment of electronic warfare (EW), computer network operations (CNO), psychological operations (PSYOP), military deception (MILDEC), and operations security (OPSEC), in concert with specified supporting and related capabilities, to influence, disrupt, corrupt, or usurp adversarial human and automated decision making while protecting our own (U.S. Department of Defense, Joint Chiefs of Staff, 2006, p. ix). Online data communications deception and its discovery falls within the CNO subcategory. Problem Statement Current developments in deception detection in data communications environments are ineffective due to their time intensive data extraction processes and inefficient approach to processing data which is not suitable for deception detection in real time data communications environments. Automated linguistic and other indicators of deception have not been developed and deployed in online communications environments (Zhou & Zhang, 2008). Dissertation Goal The research goal is to create capabilities which autonomously and automatically detect deception in online data communications systems. The capabilities developed will 8 detect online data communications deception to realize this goal. To measure accuracy, evidence of a deception will be uncovered in text entered by the user. Relevance and Significance Deception in online data communications will continue to increase if automated deception detection systems are not developed to combat it. All people and organizations are susceptible to online data communications deception resulting in criminal activity and more will be victimized as the Internet continues to grow. For example, nearly one billion pounds ($1.58 billion US) have been lost due to theft by criminals using online deception as a means to commit crimes in the United Kingdom (Boongoen & Shen, 2009). Exacerbating this problem is the fact that some online data communications are completely harmless white lies,
Recommended publications
  • Roller: an Open Source Javatm Ee Blogging Platform
    ROLLER: AN OPEN SOURCE JAVATM EE BLOGGING PLATFORM • Dave Johnson – Staff Engineer S/W – Sun Microsystems, Inc. Agenda • Roller history • Roller features • Roller community • Roller internals: backend • Roller internals: frontend • Customizing Roller • Roller futures Roller started as an EJB example... • Homeport – a home page / portal (2001) ... became an O'Reilly article • Ditched EJBs and HAHTsite IDE (2002) • Used all open source tools instead and thus... ... and escaped into the wild I am allowing others to use my installation of Roller for their weblogging. Hopefully this will provide a means for enhancing the Roller user base as well as provide a nice environment for communication and expression. Anthony Eden August 8, 2002 ... to find a new home at Apache • Apache Roller (incubating) – Incubation period: June 2005 - ??? Agenda • Roller history • Roller features • Roller community • Roller internals: backend • Roller internals: frontend • Customizing Roller • Roller futures Roller features: standard blog stuff • Individual and group blogs • Hierarchical categories • Comments, trackbacks and referrers • File-upload and Podcasting support • User editable page templates • RSS and Atom feeds • Blog client support (Blogger/MetaWeblog API) • Built-in search engine Multiple blogs per user Multiple users per blog Blog client support • XML-RPC based Blogger and MetaWeblog API • Lots of blog clients work with Roller, for example: ecto http://ecto.kung-foo.tv For Mac OSX and Windows Roller 3.0: What's new • Big new release, 3 months in dev
    [Show full text]
  • Return of Organization Exempt from Income
    OMB No. 1545-0047 Return of Organization Exempt From Income Tax Form 990 Under section 501(c), 527, or 4947(a)(1) of the Internal Revenue Code (except black lung benefit trust or private foundation) Open to Public Department of the Treasury Internal Revenue Service The organization may have to use a copy of this return to satisfy state reporting requirements. Inspection A For the 2011 calendar year, or tax year beginning 5/1/2011 , and ending 4/30/2012 B Check if applicable: C Name of organization The Apache Software Foundation D Employer identification number Address change Doing Business As 47-0825376 Name change Number and street (or P.O. box if mail is not delivered to street address) Room/suite E Telephone number Initial return 1901 Munsey Drive (909) 374-9776 Terminated City or town, state or country, and ZIP + 4 Amended return Forest Hill MD 21050-2747 G Gross receipts $ 554,439 Application pending F Name and address of principal officer: H(a) Is this a group return for affiliates? Yes X No Jim Jagielski 1901 Munsey Drive, Forest Hill, MD 21050-2747 H(b) Are all affiliates included? Yes No I Tax-exempt status: X 501(c)(3) 501(c) ( ) (insert no.) 4947(a)(1) or 527 If "No," attach a list. (see instructions) J Website: http://www.apache.org/ H(c) Group exemption number K Form of organization: X Corporation Trust Association Other L Year of formation: 1999 M State of legal domicile: MD Part I Summary 1 Briefly describe the organization's mission or most significant activities: to provide open source software to the public that we sponsor free of charge 2 Check this box if the organization discontinued its operations or disposed of more than 25% of its net assets.
    [Show full text]
  • Listado De Libros Virtuales Base De Datos De Investigación Ebrary-Engineering Total De Libros: 8127
    LISTADO DE LIBROS VIRTUALES BASE DE DATOS DE INVESTIGACIÓN EBRARY-ENGINEERING TOTAL DE LIBROS: 8127 TIPO CODIGO CODIGO CODIGO NUMERO TIPO TITULO MEDIO IES BIBLIOTECA LIBRO EJEMPLA SOPORTE 1018 UAE-BV4 5008030 LIBRO Turbulent Combustion DIGITAL 1 1018 UAE-BV4 5006991 LIBRO Waste Incineration and the Environment DIGITAL 1 1018 UAE-BV4 5006985 LIBRO Volatile Organic Compounds in the Atmosphere DIGITAL 1 1018 UAE-BV4 5006982 LIBRO Contaminated Land and its Reclamation DIGITAL 1 1018 UAE-BV4 5006980 LIBRO Risk Assessment and Risk Management DIGITAL 1 1018 UAE-BV4 5006976 LIBRO Chlorinated Organic Micropollutants DIGITAL 1 1018 UAE-BV4 5006973 LIBRO Environmental Impact of Power Generation DIGITAL 1 1018 UAE-BV4 5006970 LIBRO Mining and its Environmental Impact DIGITAL 1 1018 UAE-BV4 5006969 LIBRO Air Quality Management DIGITAL 1 1018 UAE-BV4 5006963 LIBRO Waste Treatment and Disposal DIGITAL 1 1018 UAE-BV4 5006426 LIBRO Home Recording Power! : Set up Your Own Recording Studio for Personal & ProfessionalDIGITAL Use 1 1018 UAE-BV4 5006424 LIBRO Graphics Tablet Solutions DIGITAL 1 1018 UAE-BV4 5006422 LIBRO Paint Shop Pro Web Graphics DIGITAL 1 1018 UAE-BV4 5006014 LIBRO Stochastic Models in Reliability DIGITAL 1 1018 UAE-BV4 5006013 LIBRO Inequalities : With Applications to Engineering DIGITAL 1 1018 UAE-BV4 5005105 LIBRO Issues & Dilemmas of Biotechnology : A Reference Guide DIGITAL 1 1018 UAE-BV4 5004961 LIBRO Web Site Design is Communication Design DIGITAL 1 1018 UAE-BV4 5004620 LIBRO On Video DIGITAL 1 1018 UAE-BV4 5003092 LIBRO Windows
    [Show full text]
  • Interactive Programming Support for Secure Software Development
    INTERACTIVE PROGRAMMING SUPPORT FOR SECURE SOFTWARE DEVELOPMENT by Jing Xie A dissertation submitted to the faculty of The University of North Carolina at Charlotte in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computing and Information Systems Charlotte 2012 Approved by: Dr. Bill (Bei-Tseng) Chu Dr. Heather Richter Lipford Dr. Andrew J. Ko Dr. Xintao Wu Dr. Mary Maureen Brown ii c 2012 Jing Xie ALL RIGHTS RESERVED iii ABSTRACT JING XIE. Interactive programming support for secure software development. (Under the direction of DR. BILL (BEI-TSENG) CHU) Software vulnerabilities originating from insecure code are one of the leading causes of security problems people face today. Unfortunately, many software developers have not been adequately trained in writing secure programs that are resistant from attacks violating program confidentiality, integrity, and availability, a style of programming which I refer to as secure programming. Worse, even well-trained developers can still make programming errors, including security ones. This may be either because of their lack of understanding of secure programming practices, and/or their lapses of attention on security. Much work on software security has focused on detecting software vulnerabilities through automated analysis techniques. While they are effective, they are neither sufficient nor optimal. For instance, current tool support for secure programming, both from tool vendors as well as within the research community, focuses on catching security errors after the program is written. Static and dynamic analyzers work in a similar way as early compilers: developers must first run the tool, obtain and analyze results, diagnose programs, and finally fix the code if necessary.
    [Show full text]
  • Luciano Sampaio Martins De Souza Early Vulnerability Detection For
    Luciano Sampaio Martins de Souza Early Vulnerability Detection for Supporting Secure Programming DISSERTAÇÃO DE MESTRADO DEPARTAMENTO DE INFORMÁTICA Programa de Pós-Graduação em Informática Rio de Janeiro January 2015 Luciano Sampaio Martins de Souza Early Vulnerability Detection for Supporting Secure Programming DISSERTAÇÃO DE MESTRADO Dissertation presented to the Programa de Pós- Graduação em Informática of the Departamento de Informática, PUC-Rio, as partial fulfillment of the requirements for the degree of Mestre em Informática. Advisor: Prof. Alessandro Fabricio Garcia Rio de Janeiro January 2015 Luciano Sampaio Martins de Souza Early Vulnerability Detection for Supporting Secure Programming Dissertation presented to the Programa de Pós- Graduação em Informática of the Departamento de Informática, PUC-Rio, as partial fulfillment of the requirements for the degree of Master in Informatics. Prof. Alessandro Fabricio Garcia Advisor Departamento de Informática – PUC-Rio Prof. Anderson Oliveira da Silva Departamento de Informática – PUC-Rio Prof. Marcelo Blois Ribeiro GE Global Research Prof. Marcos Kalinowski UFJF Prof. José Eugenio Leal Coordinator of the Centro Técnico Científico da PUC-Rio Rio de Janeiro, January 15th, 2015 All rights reserved Luciano Sampaio Martins de Souza The author graduated in Computer Science from the University Tiradentes (UNIT) in 2006. He received a Graduate Degree with emphasis on Web Development from the University Tiradentes (UNIT) in 2011. His main research interest is: Software Development. Bibliographic data Souza, Luciano Sampaio Martins de Early vulnerability detection for supporting secure programming / Luciano Sampaio Martins de Souza; advisor: Alessandro Fabricio Garcia. – 2015. 132 f. :il. (color.) ; 30 cm Dissertação (mestrado) Pontifícia Universidade Católica do Rio de Janeiro, Departamento de Informática, 2015.
    [Show full text]
  • Iptables/Iptablex Ddos Bots
    IptabLes/IptabLex DDoS Bots TLP - GREEN GSI ID: 1077 Risk Factor - High OVERVIEW During Q2 2014, Akamai’s Prolexic Security Engineering and Research Team (PLXsert) detected and measured distributed denial of service (DDoS) campaigns driven by the execution of a binary that produces significant payloads by executing Domain Name System (DNS) and SYN flood attacks. One campaign peaked at 119 Gbps bandwidth and 110 Mpps in volume. It appears to originate from Asia. Observed incidents in Asia and now other parts of the world suggest the binary connects back to two hardcoded IP addresses in China.1 The mass infestation seems to be driven by a large number of Linux- based web servers being compromised, mainly by exploits of Apache Struts, Tomcat, and Elasticsearch vulnerabilities. INDICATORS OF IPTABLES/IPTABLEX INFECTION The principal indicator of this infection is the presence of a Linux ELF binary that creates a copy of itself and names it .IptabLes or .IptabLex. The leading period is intentional and is intended to help hide the file. This binary is crafted to infect popular Linux distributions such as Debian, Ubuntu, CentOS and Red Hat. Reports of the infection are shown in Figures 1, 2 and 3. 1 "MMD-0025-2014 - ITW Infection of ELF .IptabLex & .IptabLes China #DDoS Bots Malware." Malware Must Die!, 15 June 2014. 1 Figure 1: ReD Hat publicly reporteD the compromise to its customers Figure 2: A victim of IptabLes infectioN posteD reports of the hacks oN a public forum 2 Figure 3: A traNslateD report of IPtabLex / IptabLes The infections occur mainly in Linux servers with vulnerable Apache Tomcat, Struts, or Elasticsearch software.
    [Show full text]
  • Apache Roller, Acegi Security and Single Sign-On
    Colorado Software Summit: October 21 – 26, 2007 © Copyright 2007, Raible Designs Apache Roller, Acegi Security and Single Sign-on Matt Raible [email protected] http://raibledesigns.com Matt Raible — Apache Roller, Acegi Security and Single Sign-on Slide 1 Colorado Software Summit: October 21 – 26, 2007 © Copyright 2007, Raible Designs Today’s Agenda Introductions Integrating Roller with LDAP and CAS on Tomcat Introduction to Acegi Security Introduction to Apache Roller Conclusions Q and A Matt Raible — Apache Roller, Acegi Security and Single Sign-on Slide 2 Colorado Software Summit: October 21 – 26, 2007 © Copyright 2007, Raible Designs Introductions Do you blog? Do you use Roller or JRoller? What do you want to get from this session? Experience with Acegi Security, LDAP, or SSO Solutions? Preferred Server: Tomcat, Geronimo, JBoss or GlassFish? Matt Raible — Apache Roller, Acegi Security and Single Sign-on Slide 3 Colorado Software Summit: October 21 – 26, 2007 © Copyright 2007, Raible Designs Who is Matt Raible? One of the first Roller users and Committers – started in August 2002 Java Blogger since 2002 Power user of Java Web Frameworks Author of Spring Live and Pro JSP 2.0 Founder of AppFuse (http://appfuse.org) Member of Java EE 5, JSF 1.2 and Bean Validation Expert Groups Matt Raible — Apache Roller, Acegi Security and Single Sign-on Slide 4 Colorado Software Summit: October 21 – 26, 2007 © Copyright 2007, Raible Designs Integrating Roller with CAS on Tomcat http://cwiki.apache.org/confluence/display/ROLLER/Roller+4.0+with+LDAP+and+CAS
    [Show full text]
  • Installation Guide
    Installation Guide Apache Roller Weblogger Version 5.0.1 June 2012 Table of Contents 1 Overview...........................................................................................................................................................4 1.1 Copyright and trademark information....................................................................................................... 4 1.2 Feedback.................................................................................................................................................... 4 1.3 Acknowledgments......................................................................................................................................4 1.4 Modifications and Updates........................................................................................................................ 4 2 Securing Roller.................................................................................................................................................5 3 Ready to roll?................................................................................................................................................... 6 4 Download and un-package Roller.................................................................................................................. 7 4.1 Installation directory layout....................................................................................................................... 7 5 Prepare your database for Roller...................................................................................................................8
    [Show full text]
  • Unit Test Virtualization with VMVM
    Unit Test Virtualization with VMVM Jonathan Bell Gail Kaiser Columbia University Columbia University 500 West 120th St, MC 0401 500 West 120th St, MC 0401 New York, NY USA New York, NY USA [email protected] [email protected] ABSTRACT by the test suite. These tests are added to existing unit test Testing large software packages can become very time in- suites and in an ideal continuous integration environment, tensive. To address this problem, researchers have inves- executed regularly (e.g., upon code check-ins, or nightly). tigated techniques such as Test Suite Minimization. Test Because developers are often creating new tests, as software Suite Minimization reduces the number of tests in a suite grows in size and complexity, its test suite frequently grows by removing tests that appear redundant, at the risk of a similarly. Software can reach a point where its test suite has reduction in fault-finding ability since it can be difficult to gotten so large that it takes too long to regularly execute identify which tests are truly redundant. We take a com- | previous work has reported test suites in industry taking pletely different approach to solving the same problem of several weeks to execute fully [36]. long running test suites by instead reducing the time needed To cope with long running test suites, testers might turn to execute each test, an approach that we call Unit Test to Test Suite Minimization or Test Suite Prioritization [43]. Virtualization. With Unit Test Virtualization, we reduce Test Suite Minimization techniques such as [14, 15, 22, 23, the overhead of isolating each unit test with a lightweight 27, 28, 38, 41] seek to reduce the total number of tests to virtualization container.
    [Show full text]
  • Glassfish the Best Open Source Application Server
    GlassFish The Best Open Source Application Server Murthy Narayanan Sun Microsystems, Inc. 1 Agenda • What is GlassFish ? > Feature Set • Community • Success Stories • Reference GlassFish – The Best Open Source Application Server 2 "Positive on Sun and the GlassFish community's release of the second major update of their open source Java application server, GlassFish V2, and its accompanying enterprise rendition, Java System Application Server 9.1. Many technical advances ... recommend this version for enterprise` use." GlassFish – The Best Open Source Application Server 3 Agenda • What is GlassFish ? > Feature Set • Community • Success Stories • Reference GlassFish – The Best Open Source Application Server 4 What is GlassFish ? • Open Source > CDDL & GPL v2 (w/ CPE) • Java EE 5 Reference Implementation > Included in Java EE 5 SDK • Enterprise Quality > High Availability, Clustering > .NET 3.0 Web services interoperability > World Record Performance • Community > Sources, bug DBs, discussions at glassfish.java.net > Roadmaps, Architecture Documents GlassFish – The Best Open Source Application Server 5 Timeline of Project GlassFish Tomcat Jasper Catalina JSTL GlassFish v1 v2 v3 Struts v1 UR1 v2 UR1 v2.1 Crimson Launch XSLTC Xalan Xerces JAXB J1'05 J1'06 Sept. 2008/2009 JAX-RPC 2007 JSF June 2005 May 2006 (you are here) GlassFish – The Best Open Source Application Server 6 GlassFish v1 • Released JavaOne, 2006 • 1st Java EE 5 compliant implementation • Based on mature SJS Application Server 8.x code • Established Java EE market momentum •
    [Show full text]
  • Europe 2009 2009
    The Official User Conference of The Apache Software Foundation ApacheConApacheCon EuropeEurope 2009 2009 Conference Program [Updated 20090313] 23-27 March • Amsterdam Leading the Wave of Open Source http://www.eu.apachecon.com Presented by: The Apache Software Foundation Produced by: Stone Circle Productions, Inc. SPONSORED BY Gold Silver and Bronze 2009: Ten Years of The Apache Software Foundation Celebrating a Decade of Open Source Leadership 1 Thank You to Our Sponsors Gold Sponsor Silver Sponsors Bronze Sponsors Community Sponsors and Exhibitors The Apache Software Foundation http://www.apache.org/ Community and Media Partners Produced By 2 Welcome to SAVE THE DATE ApacheCon US 2009 Oakland, CA ApacheCon 2-6 November 2009 http://www.us.apachecon.com Europe 2009 ApacheCon Europe 2010 Spring 2010 Celebrating the 10th ApacheCon US 2010 Anniversary of The Apache Atlanta, GA Software Foundation 1 -5 November 2010 ApacheCon North America 2011 Vancouver BC, Canada Congratulations to The Apache Software Foundation on ten years of 7 – 11 November 2011 Open Source Leadership! It is an honor and a privilege working with all of REGIONAL GATHERINGS you in the Apache Community. We, at Stone Circle Productions, look forward to another ten years of creating and BarCampApacheOxford 2009 producing conferences that support Oxford, UK and promote the Apache Way. 4-5 April 2009 | University Club, Oxford UK http://www.barcamp.org/ From the team at Stone Circle BarCampApacheOxford Productions, Charel, Delia, Susan, Kirsten, David, BarCamp | MeetUp Asia Luke, Nate, Richard, Neil and Ping China | Sri Lanka Late Summer 2009 Fill out session evaluations live and online! http://aceu2009.crowdvine.com 3 Sponsors Hippo Gold Sponsor Gold Sponsor + Exhibitor Hippo develops the Apache licensed Hippo CMS and Hippo Portal application.
    [Show full text]
  • The Apache Software Foundation Wraps up 2007 As Its Strongest Year to Date
    Media Contact: Sally Khudairi The Apache Software Foundation +1 617 921 8656 [email protected] THE APACHE SOFTWARE FOUNDATION WRAPS UP 2007 AS ITS STRONGEST YEAR TO DATE Flexible, Meritocratic Process of “The Apache Way” Plays Key Role in Meeting Growing Demand for Innovative, Community-Developed Open Source Technologies FOREST HILL MD – 15 January 2008 – The Apache Software Foundation (ASF) – stewards, incubators, and developers of leading Open Source projects, including Apache HTTP Server, the world’s most popular Web server software for twelve years running – today announced the 2007 year finished as its strongest ever, reinforcing the broad-reaching success of “The Apache Way”. Lauded as one of the most compelling communities in Open Source, the all-volunteer Foundation looked back on milestones achieved during 2007, with ASF activities having grown at a steady rate. "We are grateful to all those individuals – Members, Committers, developers, users, and supporters – who have contributed to our success over the past year," said ASF Chairman Jim Jagielski. "Our achievements reflect strong commitment from our community, boosting confidence in our ability to meet end-user and market demand and building excitement about the work that is underway.” 2007 HIGHLIGHTS AND MILESTONES Board: 2007 marked the largest changeover of ASF Board members since The ASF’s incorporation in 1999. Reflecting the Foundation’s diverse, meritocratic Membership, the newly-elected board members are: Justin Erenkrantz (President), J. Aaron Farr (Treasurer), Jim Jagielski (Chairman), Geir Magnusson Jr., William Rowe Jr., Sam Ruby (Executive Vice President/Secretary), Henning Schmiedehausen, Greg Stein, and Henri Yandell. Membership: at its inception, The ASF comprised 21 individuals who oversaw the progress of the Apache HTTP Server, forming the Foundation’s core membership.
    [Show full text]